IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting

Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting
View Sample PDF
Author(s): Archana V. Mire (Sardar Vallabhbhai National Institute of Technology, Surat (SVNIT), Surat, India), Sanjay B. Dhok (Visvesvaraya National Institute of Technology (VNIT), Nagpur, India), Narendra. J. Mistry (Sardar Vallabhbhai National Institute of Technology, Surat (SVNIT), Surat, India)and Prakash D. Porey (Visvesvaraya National Institute of Technology (VNIT), Nagpur, India)
Copyright: 2015
Volume: 7
Issue: 4
Pages: 22
Source title: International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/IJDCF.2015100103

Purchase

View Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting on the publisher's website for pricing and purchasing information.

Abstract

Facebook images get distributed within a fraction of a second, which hackers may tamper and redistribute on cyberspace. JPEG fingerprint based tampering detection techniques have major scope in tampering localization within standard JPEG images. The majority of these algorithms fails to detect tampering created using Facebook images. Facebook utilizes down-sampling followed by compression, which makes difficult to locate tampering created with these images. In this paper, the authors have proposed the tampering localization algorithm, which locates tampering created with the images downloaded from Facebook. The algorithm uses Factor Histogram of DCT coefficients at first 15 modes to find primary quantization steps. The image is divided into BXB overlapping blocks and each block is processed individually. Votes cast by these modes for conceivable tampering are collected at every pixel position and the ones above threshold are used to form different regions. High density voted region is proclaimed as tampered region.

Related Content

Shakir A. Mehdiyev, Tahmasib Kh. Fataliyev. © 2024. 17 pages.
Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu. © 2024. 13 pages.
Dawei Zhang. © 2024. 16 pages.
Yuwen Zhu, Lei Yu. © 2023. 16 pages.
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu. © 2023. 14 pages.
Wenjun Yao, Ying Jiang, Yang Yang. © 2023. 20 pages.
Dawei Zhang. © 2023. 14 pages.
Body Bottom